US20080243920A1 - Communication Reputation - Google Patents
Communication Reputation Download PDFInfo
- Publication number
- US20080243920A1 US20080243920A1 US11/692,865 US69286507A US2008243920A1 US 20080243920 A1 US20080243920 A1 US 20080243920A1 US 69286507 A US69286507 A US 69286507A US 2008243920 A1 US2008243920 A1 US 2008243920A1
- Authority
- US
- United States
- Prior art keywords
- reputation
- communication
- reputation data
- request
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42136—Administration or customisation of services
- H04M3/42153—Administration or customisation of services by subscriber
- H04M3/42161—Administration or customisation of services by subscriber via computer interface
Definitions
- Telephony and text messaging is becoming increasingly widespread.
- mobile communication devices allow users to remain in near continual communication throughout his/her daily life.
- Many devices such as mobile telephone communication devices, may additionally permit textual communication, such as “text messaging” (TM) or “instant messaging” (IM), which may further ease user communication.
- TM text messaging
- IM instant messaging
- certain types of communications such as, sales calls; text messages for goods or services; adult content; calls or messages which are of a dubious nature (i.e., known or suspected scams) or may result in a fee (a “900” number or a fee based IM).
- a user may be hesitant to communicate with an unknown party.
- a prime example of this problem is a telephone call which is received during dinnertime. Even if the user subscribes to “caller id,” which provides the user with the telephone number associated with the communication, this information may be of limited use in deciding whether to “pickup” or complete the call. Additionally, persons attempting to defraud a user may implement a variety of techniques to avoid revealing his/her identity. A party attempting to implement a telephone scam may use numerous telephone numbers and aliases to minimize detection.
- a user may be hesitant to communicate with an inbound call or other communication because he/she is not sure if the other party is legitimate. For instance, a caller may ask to call back a credit card company, at the phone number provided on the credit card, rather than risk divulging information to a party establishing an inbound communication.
- Outbound communications are also subject to similar problems. Some users may avoid contacting legitimate businesses/institutions in an attempt to avoid being defrauded. The foregoing situation may be exemplified by senior citizens and other portions of the population which are increasingly the targets of fraudulent communications. For instance, a 3 rd party may attempt to establish a “phony” toll-free number to lure unsuspecting users into divulging financial or personal information which is subsequently used in a fraudulent manner. Other forms of communication, such as mail solicitation, television commercials, may be implemented in order to direct users to contact these phony numbers.
- a request to establish a communication link may include searching a database of reputation data for information regarding at least one of the source's or the intended receiver's reputation data.
- FIG. 1 illustrates an environment in an exemplary implementation that may use technologies to provide communication reputation data.
- FIG. 2 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is provided to a source or an intended receiver.
- FIG. 3 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is implemented to block communication or present reputation data.
- a communication end point may be a communication source or a communication intended receiver/receiver.
- the techniques described herein may be applicable to inbound and outbound directed communications. While telephonic (voice “land line”) communication is primarily discussed, the techniques, software/hardware and system are additionally applicable to mobile telephone communication (including cellular telephone communication), instant messaging, text messaging, voice messaging, and facsimile communication. Examples of telephone communication may include land lines, cellular communications, as well as, voice over internet protocol communications (VoIP).
- VoIP voice over internet protocol communications
- reputation data is provided to a source and/or an intended receiver as part of a request to complete a communication link.
- a database is searched to obtain reputation data associated with one of the end points to the intended communication. For example, at least a portion of a caller's reputation may be presented to the intended recipient as a visual display or audible cue, so that the recipient may better understand the caller's (end point) reputation.
- exemplary environments are first described that are operable to provide communication end point reputation to another communication endpoint.
- the reputation of a call's source is provided to an intended receiver.
- a communication source may be provided with reputation data associated with the intended receiver.
- an audible message may be presented to warn the caller that the intended recipient has a “suspicious” reputation.
- the provided communication end point reputation may be used to block a requested communication, or may be presented to another end point, and so on.
- FIG. 1 illustrates an environment 100 in an exemplary implementation that is operable to employ a reputation classification system 102 .
- An assignment module 106 may be included in the reputation classification system 102 . As illustrated, the reputation classification system 102 is resident on a computing device 104 which is remote from the communication request. The assignment module 106 may accept user feedback information and usage information to generate reputation data associated with a communication end point.
- the assignment module 106 may be configured to collect data and assign reputation and classification to a communication end point. For instance, after a predetermined number of short duration phone calls and reports from clients, indicating the conversation was “financial” in nature and “suspicious,” the assignment module 106 assigns the communication source a “solicitor” classification. This assignment may be based on usage, reported reputation or a combination thereof. The source also may be assigned a “suspicious” reputation.
- Assigned reputation data including the end point classification, may be stored in a database 108 .
- the assignment module 106 may forward additional reputation data to the database 108 for storage.
- the assignment module 106 may send reputation data regarding how the classification and reputation determination was made. Examples may include an agency reporting the end point, a “large” group of users (in comparison to other end point reputation data stored in the database 108 ) reporting similar reputation information and classification information, a “small” group (in comparison to other reputation data stored in the database 108 ) reporting an “egregious” reputation information and an “offensive” classification information, and so on.
- the database may be arranged in a hierarchical configuration to promote efficient searching. For example, a database for telephone communication end points may be arranged according to “area code” and “prefix.”
- reputation data may include date stamps, an identity (such as a phone number), how many users are associated with an identifier (such as a telephone number), communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on.
- the assignment module 106 may integrate user feedback information and usage information to maintain reputation data for the communication request source or intended receiver/receiver.
- reputation data includes a scaled value for a reputation and a classification.
- a reputation scale may range from “good” or “trustworthy” to “suspicious” to “bad.”
- the different reputation descriptors may be associated with numerical ranges. For instance, a “bad” input may be assigned a higher scale value than a “suspicious” ranking.
- Implementing a scale may permit weighting feedback and other analysis. For example, “bad” reputation feedback may be weighted more than a “good” reputation feedback.
- Classifications may include, but are not limited to, solicitations, pay services, adult content, and so on. Multiple classifications may be applied. For example, an adult end point having a fee component, may be assigned an “adult” and a “fee service” classification. The classifications may be scaled as well.
- the assignment module 106 may assign additional or different factors as part of the reputation data for use with an end point associated with a minor.
- the reputation classification system 102 as described herein may permit “parental control” thorough use of assigned reputation data.
- the assignment module 106 may obtain feedback information from an interface module 110 associated with a communication end point. For example, at the end of a telephone conversation, the receiver may input reputation feedback information associated with the source of the call. For instance, a user may input data via a web page using a check box, an adjustable indicator, and so on.
- the interface module 110 is accessed as a web page on which the user may input data associated with the communication. For example, a user may interact with the interface module 110 to classify a communication requesting a donation as a “financial solicitation.” Further, the user may assign a “suspicious” reputation to the source end point.
- the interface module 10 is included in a communication device. For example, a user may navigate a screen included on a land line phone 114 to input reputation data. For text messages, a user may submit a text message, to the interface module 110 , regarding the reputation of the party sending an original text message. For devices with limited functionality (for data to be entered), the interface module 110 may accommodate telephone inputs. For instance, a user may call an established toll free number to input reputation data.
- the interface module 110 may request a password to access data, report a reputation or access other features. This may permit a parent to exercise control over a common communication device or tailor a communication device specifically for a minor.
- the reputation classification system 102 may include a service module 116 .
- the service module 116 may forward usage information to the assignment module 106 .
- a usage pattern is forwarded to the assignment module 106 for incorporation into reputation data.
- the service module 116 may identify an end, point making numerous short duration phone calls, to the assignment module 106 .
- Usage information may include, but is not limited to, identifying an end point which routinely communicates with particular segments of the population. For example, social engineering “campaigns” may contact numerous devices associated with users belonging to a particular group. Common targets may include senior citizens, people who contributed to organizations, people residing in particular areas, and so on.
- reputation data may be integrated from other communication formats.
- reputation data derived from other communications mediums may be incorporated into reputation data for the relevant medium.
- a user may report a telephone number associated with a physical mail solicitation to the interface module 110 for consideration in determining a telephone reputation.
- the service module 116 may block a telephone communication from a telephone number associated with an email “SPAM” campaign.
- a communication end point which is related to a well characterized communication end point (such as a highly trafficked corporate web site) in another communication format may be assigned a reputation and classification based at least partially on the reputation data characteristics for the other communication medium. For example, a telephone number associated with a highly trafficked corporate or government web site is assigned a “verified” telephone reputation based on the communication characteristics associated with the Web traffic.
- the service module 116 blocks or presents reputation data based on learned user preferences.
- the service module 116 may block the communication if one or more criteria are met. Criteria may include a portion of the reputation data stored in the database 108 .
- the service module 116 may block communications from an end point having with a “fee” classification. Blocking may be achieved by the communication device querying the service module 116 via a simple object access protocol (SOAP).
- SOAP simple object access protocol
- the communication device may access the service module 116 by a SOAP request.
- the service module 116 may allow passive blocking of communication requests based on learned user preferences. For example, the service module 116 may block communications having reputation characteristic(s) similar to those the user has previously blocked, reported unfavorable reputation data, ended the communication quickly, and so on. The service module 116 may apply a heuristic determination of previous user inputs and usage to determine whether to permit the call or present reputation data.
- the service module 116 provides at least a portion of the reputation data based on the assigned reputation, if a user has previously requested reputation data for “questionable” end points.
- the service module 116 may block a communication from a “bad” end point, if the user has previously blocked calls from other “bad” end points.
- the service module 116 may present an audible warning of the end point's reputation data.
- the service module 116 may adaptively learn which communication requests to block, or present data for, as a result of user preference changes. For example, if a user repeatedly blocks a “questionable” end point the service module 116 may block similar end points. Further, if a user has several outbound communications with “questionable” end points the service module 116 may raise the threshold for incoming calls. The user may configure the interface module 110 to override the service module 116 as desired.
- the user may override the passive blocking by applying user selected rules.
- a user may turn off passive blocking, rather than risk blocking a desired communication.
- the user may interact with the service module 116 by adjusting the level at which passive blocking is applied. The user may do this by accessing the service module 116 through the interface module 110 .
- the service module 116 may include an address book of acceptable communication end points.
- the address book may be maintained in the database 108 as well.
- the service module 116 may search the address book prior to searching reputation data.
- the service module may include a list of acceptable communication sources, for the intended receiver, so that a communication from a family member is passed through without searching for the source's reputation.
- the system components and the communication devices may communicate via a network 118 or multiple networks.
- the network 118 is the “Internet,” or the “World Wide Web,” while the communication request and subsequent communication occur over a separate land line network.
- VoIP Voice over Internet Protocol telephone communication
- the Internet may be utilized for both the voice communication and communications for the reputation classification system components.
- a cellular network may be included. For example, communication requests may be passed over a wireless cellular link, while communications between the smart phone and the reputation classification system 102 occur over the cellular network and the Internet.
- the network may include a wide area network (WAN), a local area network (LAN), a wireless network, a public telephone network, an intranet, and so on.
- WAN wide area network
- LAN local area network
- wireless network a public telephone network
- intranet an intranet
- the network may be configured to include multiple sub-networks or multiple different networks.
- a reputation classification system may be partially maintained on a device functioning as a communication end point.
- the user module and the interface module 110 may be included on a smart phone to interact with a database 108 maintained by a computing device 104 .
- the interface module 122 may reside on an end point device (such as the smart phone 120 ), while the assignment module 124 and the service module 126 and database 128 reside on private branch exchange hardware 130 .
- any of the functions described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry), manual processing, or a combination of these implementations.
- the terms “module,” “functionality,” and “logic” as used herein generally represent software, firmware, hardware, or a combination thereof.
- the module, functionality, or logic represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs).
- the program code can be stored in one or more computer readable memory devices, e.g., memory.
- FIG. 2 discloses an exemplary procedure of reputation communication filtering.
- the procedure may include requesting 202 establishment of a communication link between a source and an intended receiver/receiver.
- Examples of communication link requests include placing a telephone call or facsimile by dialing a telephone number, transmitting a text message, and so on.
- the communication link request may be issued over a dedicated network. For instance, an incoming communication request may be issued over a land line network.
- a database including reputation data may be searched 204 for reputation data associated with the source of the communication, the intended receiver or combinations thereof.
- the procedure may include searching a database of reputation data associated with a physical device used in the communication request.
- Reputation data may include at least a reputation and a classification for a source, an intended receiver/receiver.
- a list or address book of acceptable communication sources/intended receiver may be checked 206 so that the communication link is connected without having to search for reputation data.
- the procedure may include searching the user's “acceptable” address book prior to searching for reputation data. If an end point is included in the address book the communication may be permitted without searching the database. Thus, database searching may be avoided for communication end points occurring in the address book. Personalized information associated with the communication end point in the address book may be provided.
- Searching may be initiated by forwarding the search request from the communication device to a remote server.
- a facsimile machine forwards a search request to a remote computer prior to connecting the facsimile call.
- the fax may implement a SOAP communication with a remote server which searches the database. This search request may be made over a separate network than the network on which the communication request was received.
- the communication request is intercepted by intermediate device which requests a search prior to completing the communication link with the intended device.
- intermediate device For example, a PBX exchange device searches a database including reputation data before the call is completed to the intended receiver.
- the intermediate device may at least partially communicate over the network on which the original communication request was placed.
- the matched reputation data may be provided 208 to the source or the intended receiver.
- the obtained reputation data may be provided to a smart phone for visual presentation 210 or as audible cue.
- the reputation data may be forwarded through the intermediate device and then to the end communication device.
- the communication request may be blocked 210 without displaying the reputation data.
- the reputation data is displayed, but the communication link is not completed.
- a log of blocked communication requests may be maintained.
- the reputation data may be retained in a “blocked” log for user observation.
- reputation data is presented if one or more criteria are met.
- criteria include adult content, a verified charity, a scalar reputation value, classification, financial solicitation and so on. If, for instance, a call is “questionable” the procedure may include presenting a portion of the data as a warning, while a “bad” source is blocked without display. Pre-selected ring tones may be used to alert the user of a blocked call.
- An adjustable threshold may be set to determine when blocking or display of reputation data is appropriate. For example, a heuristic user preference determination may be used to reset a “block” threshold level. Other learning techniques are available as well. For instance, a system implementing the present process may passively block communications unless overridden by the user.
- the procedure may include accepting user feedback 212 .
- User feedback may include providing reputation information, classification information and so on.
- User feedback may be obtained through a communication device, accessed over the Internet and so on.
- Feedback may be solicited at the end of a communication resulting from the communication request.
- a user may be prompted to enter data via an input on the device, call a “toll-free” (or other) number or access a web page.
- a user is asked to text feedback.
- the procedure may include comparing 302 an end point with a database. For example, the telephone number from which a telephone call is placed is compared to reputation data associated with telephone numbers stored in the database.
- an “address book” of acceptable communication end points may be maintained so comparing may be bypassed, if the end point matches an acceptable end point maintained in the address book.
- the database may include reputation data associated with a communication end point.
- the database may include reputation information and classification information for an identified end point. For instance, a call placed from (509) 555-1212 is compared to the database. If the telephone number is matched, the associated reputation (such as “suspicious”) and the classification (such as “financial solicitation”) maintained in the database are retrieved.
- reputation data may include how the reputation was determined, an identity, a number of users associated with an identifier (such as a phone number), date stamps, communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on.
- a database record of reputation data may include the following information.
- Comparing may be done in response to a communication request. For example, a database search is initiated in response to a source placing a telephone call or sending a text message. If a delay occurs in completing the communication link, a message may be presented to explain the delay. The message may function as an additional deterrent for unsolicited calls.
- the database may be maintained by a third party. For example, a telephone company or a cellular telephone service provider. In other instances, service provider or organization may maintain the database.
- the reputation data obtained 306 from the comparison may be forwarded to a service module for use 308 with learned blocking rules or user defined rules based on user selection.
- the communication request may be blocked 308 based on a heuristic determination of user preferences. For instance, although additional reputation data is maintained in the database, only a portion of the maintained reputation data may be used in response to the search. For example, additional information is not retrieved based on user preferences, display capability or communication blocking profiles.
- the obtained reputation data is implemented for display, presented as an audible cue, and so on.
- the obtained reputation data may be forwarded to a user interface associated with the communication device. Presenting reputation data similarly may based on learned user preferences (such as a heuristic determination), or on user applied rules.
- the procedure may include permitting 310 reputation feedback upon completion of a communication resulting from the communication request. For example, after a user has “viewed” a text message the user may be permitted to provide reputation feedback.
- a user may be permitted or perhaps, reminded via an audible message that he/she can provide reputation feedback. For example, the user may be prompted to “delete” the voice mail message and concurrently provide reputation feedback (e.g., a message stating “press 7 to delete and report as a financial solicitation”).
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Computer Networks & Wireless Communication (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- Telephony and text messaging is becoming increasingly widespread. In addition to fixed location communication systems, mobile communication devices allow users to remain in near continual communication throughout his/her daily life. Many devices, such as mobile telephone communication devices, may additionally permit textual communication, such as “text messaging” (TM) or “instant messaging” (IM), which may further ease user communication.
- While increased communication connectivity is beneficial, unwanted interruptions may intrude on a user's daily life. For example, a user may wish to avoid certain types of communications such as, sales calls; text messages for goods or services; adult content; calls or messages which are of a dubious nature (i.e., known or suspected scams) or may result in a fee (a “900” number or a fee based IM). In other situations, a user may be hesitant to communicate with an unknown party.
- Limited information exists to avoid unwanted communications or be aware of a communicant's status. A prime example of this problem is a telephone call which is received during dinnertime. Even if the user subscribes to “caller id,” which provides the user with the telephone number associated with the communication, this information may be of limited use in deciding whether to “pickup” or complete the call. Additionally, persons attempting to defraud a user may implement a variety of techniques to avoid revealing his/her identity. A party attempting to implement a telephone scam may use numerous telephone numbers and aliases to minimize detection.
- As a result, a user may be hesitant to communicate with an inbound call or other communication because he/she is not sure if the other party is legitimate. For instance, a caller may ask to call back a credit card company, at the phone number provided on the credit card, rather than risk divulging information to a party establishing an inbound communication.
- Outbound communications are also subject to similar problems. Some users may avoid contacting legitimate businesses/institutions in an attempt to avoid being defrauded. The foregoing situation may be exemplified by senior citizens and other portions of the population which are increasingly the targets of fraudulent communications. For instance, a 3rd party may attempt to establish a “phony” toll-free number to lure unsuspecting users into divulging financial or personal information which is subsequently used in a fraudulent manner. Other forms of communication, such as mail solicitation, television commercials, may be implemented in order to direct users to contact these phony numbers.
- Techniques are described which may provide information regarding the end point's reputation, for presentation, or selectively block communications according to user preferences. In an implementation, a request to establish a communication link may include searching a database of reputation data for information regarding at least one of the source's or the intended receiver's reputation data.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
- The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different instances in the description and the figures may indicate similar or identical items.
-
FIG. 1 illustrates an environment in an exemplary implementation that may use technologies to provide communication reputation data. -
FIG. 2 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is provided to a source or an intended receiver. -
FIG. 3 is a flow diagram depicting a procedure in an exemplary implementation in which reputation data is implemented to block communication or present reputation data. - Overview
- Accordingly, techniques are described to provide reputation data to a communication end point to prevent communication, present reputation information, and so on. For example, prior to a phone call being completed, an end point is presented with reputation data associated with the source of the call. In the present discussion, a communication end point may be a communication source or a communication intended receiver/receiver. The techniques described herein may be applicable to inbound and outbound directed communications. While telephonic (voice “land line”) communication is primarily discussed, the techniques, software/hardware and system are additionally applicable to mobile telephone communication (including cellular telephone communication), instant messaging, text messaging, voice messaging, and facsimile communication. Examples of telephone communication may include land lines, cellular communications, as well as, voice over internet protocol communications (VoIP).
- In an implementations, techniques are described in which reputation data is provided to a source and/or an intended receiver as part of a request to complete a communication link. A database is searched to obtain reputation data associated with one of the end points to the intended communication. For example, at least a portion of a caller's reputation may be presented to the intended recipient as a visual display or audible cue, so that the recipient may better understand the caller's (end point) reputation.
- In the following discussion, exemplary environments are first described that are operable to provide communication end point reputation to another communication endpoint. For example, the reputation of a call's source is provided to an intended receiver. For outbound communications, a communication source may be provided with reputation data associated with the intended receiver. For example, an audible message may be presented to warn the caller that the intended recipient has a “suspicious” reputation. The provided communication end point reputation may be used to block a requested communication, or may be presented to another end point, and so on.
- Exemplary Environment
-
FIG. 1 illustrates anenvironment 100 in an exemplary implementation that is operable to employ areputation classification system 102. Anassignment module 106 may be included in thereputation classification system 102. As illustrated, thereputation classification system 102 is resident on acomputing device 104 which is remote from the communication request. Theassignment module 106 may accept user feedback information and usage information to generate reputation data associated with a communication end point. - The
assignment module 106 may be configured to collect data and assign reputation and classification to a communication end point. For instance, after a predetermined number of short duration phone calls and reports from clients, indicating the conversation was “financial” in nature and “suspicious,” theassignment module 106 assigns the communication source a “solicitor” classification. This assignment may be based on usage, reported reputation or a combination thereof. The source also may be assigned a “suspicious” reputation. - Assigned reputation data, including the end point classification, may be stored in a
database 108. Theassignment module 106 may forward additional reputation data to thedatabase 108 for storage. For example, theassignment module 106 may send reputation data regarding how the classification and reputation determination was made. Examples may include an agency reporting the end point, a “large” group of users (in comparison to other end point reputation data stored in the database 108) reporting similar reputation information and classification information, a “small” group (in comparison to other reputation data stored in the database 108) reporting an “egregious” reputation information and an “offensive” classification information, and so on. The database may be arranged in a hierarchical configuration to promote efficient searching. For example, a database for telephone communication end points may be arranged according to “area code” and “prefix.” - Other reputation data may include date stamps, an identity (such as a phone number), how many users are associated with an identifier (such as a telephone number), communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on. The
assignment module 106 may integrate user feedback information and usage information to maintain reputation data for the communication request source or intended receiver/receiver. - In specific implementations, reputation data includes a scaled value for a reputation and a classification. A reputation scale may range from “good” or “trustworthy” to “suspicious” to “bad.” Correspondingly, the different reputation descriptors may be associated with numerical ranges. For instance, a “bad” input may be assigned a higher scale value than a “suspicious” ranking. Implementing a scale may permit weighting feedback and other analysis. For example, “bad” reputation feedback may be weighted more than a “good” reputation feedback. Classifications may include, but are not limited to, solicitations, pay services, adult content, and so on. Multiple classifications may be applied. For example, an adult end point having a fee component, may be assigned an “adult” and a “fee service” classification. The classifications may be scaled as well.
- Different reputations and classifications schemes may be utilized for end points associated with minors. For example, the
assignment module 106 may assign additional or different factors as part of the reputation data for use with an end point associated with a minor. Thereputation classification system 102 as described herein may permit “parental control” thorough use of assigned reputation data. - The
assignment module 106 may obtain feedback information from aninterface module 110 associated with a communication end point. For example, at the end of a telephone conversation, the receiver may input reputation feedback information associated with the source of the call. For instance, a user may input data via a web page using a check box, an adjustable indicator, and so on. - In possible implementations, the
interface module 110 is accessed as a web page on which the user may input data associated with the communication. For example, a user may interact with theinterface module 110 to classify a communication requesting a donation as a “financial solicitation.” Further, the user may assign a “suspicious” reputation to the source end point. - In other implementations, the interface module 10 is included in a communication device. For example, a user may navigate a screen included on a
land line phone 114 to input reputation data. For text messages, a user may submit a text message, to theinterface module 110, regarding the reputation of the party sending an original text message. For devices with limited functionality (for data to be entered), theinterface module 110 may accommodate telephone inputs. For instance, a user may call an established toll free number to input reputation data. - The
interface module 110 may request a password to access data, report a reputation or access other features. This may permit a parent to exercise control over a common communication device or tailor a communication device specifically for a minor. - The
reputation classification system 102 may include a service module 116. The service module 116 may forward usage information to theassignment module 106. For example, a usage pattern is forwarded to theassignment module 106 for incorporation into reputation data. Thus, the service module 116 may identify an end, point making numerous short duration phone calls, to theassignment module 106. Usage information may include, but is not limited to, identifying an end point which routinely communicates with particular segments of the population. For example, social engineering “campaigns” may contact numerous devices associated with users belonging to a particular group. Common targets may include senior citizens, people who contributed to organizations, people residing in particular areas, and so on. - In additional implementations, reputation data may be integrated from other communication formats. Thus, reputation data derived from other communications mediums may be incorporated into reputation data for the relevant medium. For example, a user may report a telephone number associated with a physical mail solicitation to the
interface module 110 for consideration in determining a telephone reputation. In other instances, the service module 116 may block a telephone communication from a telephone number associated with an email “SPAM” campaign. In contrast, a communication end point which is related to a well characterized communication end point (such as a highly trafficked corporate web site) in another communication format may be assigned a reputation and classification based at least partially on the reputation data characteristics for the other communication medium. For example, a telephone number associated with a highly trafficked corporate or government web site is assigned a “verified” telephone reputation based on the communication characteristics associated with the Web traffic. - In further implementations, the service module 116 blocks or presents reputation data based on learned user preferences. The service module 116 may block the communication if one or more criteria are met. Criteria may include a portion of the reputation data stored in the
database 108. For example, the service module 116 may block communications from an end point having with a “fee” classification. Blocking may be achieved by the communication device querying the service module 116 via a simple object access protocol (SOAP). For example, the communication device may access the service module 116 by a SOAP request. - The service module 116 may allow passive blocking of communication requests based on learned user preferences. For example, the service module 116 may block communications having reputation characteristic(s) similar to those the user has previously blocked, reported unfavorable reputation data, ended the communication quickly, and so on. The service module 116 may apply a heuristic determination of previous user inputs and usage to determine whether to permit the call or present reputation data.
- If, for example, a communication is from a “questionable” end point, the service module 116 provides at least a portion of the reputation data based on the assigned reputation, if a user has previously requested reputation data for “questionable” end points. The service module 116 may block a communication from a “bad” end point, if the user has previously blocked calls from other “bad” end points. For outbound communications the service module 116 may present an audible warning of the end point's reputation data. The service module 116 may adaptively learn which communication requests to block, or present data for, as a result of user preference changes. For example, if a user repeatedly blocks a “questionable” end point the service module 116 may block similar end points. Further, if a user has several outbound communications with “questionable” end points the service module 116 may raise the threshold for incoming calls. The user may configure the
interface module 110 to override the service module 116 as desired. - In other instances, the user may override the passive blocking by applying user selected rules. A user may turn off passive blocking, rather than risk blocking a desired communication. Further, the user may interact with the service module 116 by adjusting the level at which passive blocking is applied. The user may do this by accessing the service module 116 through the
interface module 110. - In her implementations, the service module 116 may include an address book of acceptable communication end points. Alternatively, the address book may be maintained in the
database 108 as well. In this manner, the service module 116 may search the address book prior to searching reputation data. For example, the service module may include a list of acceptable communication sources, for the intended receiver, so that a communication from a family member is passed through without searching for the source's reputation. - Depending on the
reputation classification system 102 configuration, the system components and the communication devices may communicate via anetwork 118 or multiple networks. For example, thenetwork 118 is the “Internet,” or the “World Wide Web,” while the communication request and subsequent communication occur over a separate land line network. In the case of a Voice over Internet Protocol telephone communication (VoIP), the Internet may be utilized for both the voice communication and communications for the reputation classification system components. In the case of a text messaging system, a cell phone or a smart phone 120, a cellular network may be included. For example, communication requests may be passed over a wireless cellular link, while communications between the smart phone and thereputation classification system 102 occur over the cellular network and the Internet. - While the Internet is referenced throughout the previous discussion, other networks are suitable as well. For example, the network may include a wide area network (WAN), a local area network (LAN), a wireless network, a public telephone network, an intranet, and so on. Although a network is shown, the network may be configured to include multiple sub-networks or multiple different networks.
- In further cases, a reputation classification system may be partially maintained on a device functioning as a communication end point. For example, the user module and the
interface module 110 may be included on a smart phone to interact with adatabase 108 maintained by acomputing device 104. - Other configurations are contemplated as well. For example, the
interface module 122 may reside on an end point device (such as the smart phone 120), while theassignment module 124 and theservice module 126 anddatabase 128 reside on privatebranch exchange hardware 130. - Generally, any of the functions described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry), manual processing, or a combination of these implementations. The terms “module,” “functionality,” and “logic” as used herein generally represent software, firmware, hardware, or a combination thereof. In the case of a software implementation, for instance, the module, functionality, or logic represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs). The program code can be stored in one or more computer readable memory devices, e.g., memory.
- The following discussion describes transformation techniques that may be implemented utilizing the previously described systems and devices. Aspects of each of the procedures may be implemented in hardware, firmware, or software, or a combination thereof. The procedures are shown as a set of blocks that specify operations performed by one or more devices and are not necessarily limited to the orders shown for performing the operations by the respective blocks.
- Exemplary Procedures
- The following discussion describes a methodology that may be implemented utilizing the previously described systems and devices. Aspects of each of the procedures may be implemented in hardware, firmware, or software, or a combination thereof. The procedures are shown as a set of blocks that specify operations performed by one or more devices and are not necessarily limited to the orders shown for performing the operations by the respective blocks. A variety of other examples are also contemplated.
-
FIG. 2 discloses an exemplary procedure of reputation communication filtering. The procedure may include requesting 202 establishment of a communication link between a source and an intended receiver/receiver. Examples of communication link requests include placing a telephone call or facsimile by dialing a telephone number, transmitting a text message, and so on. The communication link request may be issued over a dedicated network. For instance, an incoming communication request may be issued over a land line network. - A database including reputation data may be searched 204 for reputation data associated with the source of the communication, the intended receiver or combinations thereof. The procedure may include searching a database of reputation data associated with a physical device used in the communication request. Reputation data may include at least a reputation and a classification for a source, an intended receiver/receiver. A list or address book of acceptable communication sources/intended receiver may be checked 206 so that the communication link is connected without having to search for reputation data. For example, the procedure may include searching the user's “acceptable” address book prior to searching for reputation data. If an end point is included in the address book the communication may be permitted without searching the database. Thus, database searching may be avoided for communication end points occurring in the address book. Personalized information associated with the communication end point in the address book may be provided.
- Searching may be initiated by forwarding the search request from the communication device to a remote server. For example, a facsimile machine forwards a search request to a remote computer prior to connecting the facsimile call. In this case, the fax may implement a SOAP communication with a remote server which searches the database. This search request may be made over a separate network than the network on which the communication request was received.
- In further examples, the communication request is intercepted by intermediate device which requests a search prior to completing the communication link with the intended device. For example, a PBX exchange device searches a database including reputation data before the call is completed to the intended receiver. In this instance, as well as others, the intermediate device may at least partially communicate over the network on which the original communication request was placed.
- If a match is obtained, the matched reputation data may be provided 208 to the source or the intended receiver. For example, the obtained reputation data may be provided to a smart phone for
visual presentation 210 or as audible cue. In the case of an intermediate device, the reputation data may be forwarded through the intermediate device and then to the end communication device. - If the obtained reputation data meets a “block” criteria, the communication request may be blocked 210 without displaying the reputation data. In other instances, the reputation data is displayed, but the communication link is not completed. A log of blocked communication requests may be maintained. For example, the reputation data may be retained in a “blocked” log for user observation.
- In other instances, reputation data is presented if one or more criteria are met. Exemplary criteria include adult content, a verified charity, a scalar reputation value, classification, financial solicitation and so on. If, for instance, a call is “questionable” the procedure may include presenting a portion of the data as a warning, while a “bad” source is blocked without display. Pre-selected ring tones may be used to alert the user of a blocked call.
- An adjustable threshold may be set to determine when blocking or display of reputation data is appropriate. For example, a heuristic user preference determination may be used to reset a “block” threshold level. Other learning techniques are available as well. For instance, a system implementing the present process may passively block communications unless overridden by the user.
- The procedure may include accepting
user feedback 212. User feedback may include providing reputation information, classification information and so on. User feedback may be obtained through a communication device, accessed over the Internet and so on. - Feedback may be solicited at the end of a communication resulting from the communication request. For a land line phone, a user may be prompted to enter data via an input on the device, call a “toll-free” (or other) number or access a web page. In another example, a user is asked to text feedback.
- Referring to
FIG. 3 , a procedure and computer readable-media including computer-executable instructions that may direct a computer to perform the disclosed procedure are discussed. The procedure may include comparing 302 an end point with a database. For example, the telephone number from which a telephone call is placed is compared to reputation data associated with telephone numbers stored in the database. Optionally, an “address book” of acceptable communication end points may be maintained so comparing may be bypassed, if the end point matches an acceptable end point maintained in the address book. - The database may include reputation data associated with a communication end point. For instance, the database may include reputation information and classification information for an identified end point. For instance, a call placed from (509) 555-1212 is compared to the database. If the telephone number is matched, the associated reputation (such as “suspicious”) and the classification (such as “financial solicitation”) maintained in the database are retrieved.
- Other information may be included in the reputation data. Other reputation data may include how the reputation was determined, an identity, a number of users associated with an identifier (such as a phone number), date stamps, communication history, reputation data to aid data analysis, evidence to support an assigned reputation, and so on. For example, a database record of reputation data may include the following information.
-
TABLE 1 Database Record Area Code Prefix Number Reputation Classification Reported Misc. 509 555 1212 questionable solicitation individuals calls at dinner time - Comparing may be done in response to a communication request. For example, a database search is initiated in response to a source placing a telephone call or sending a text message. If a delay occurs in completing the communication link, a message may be presented to explain the delay. The message may function as an additional deterrent for unsolicited calls. The database may be maintained by a third party. For example, a telephone company or a cellular telephone service provider. In other instances, service provider or organization may maintain the database.
- The reputation data obtained 306 from the comparison, may be forwarded to a service module for
use 308 with learned blocking rules or user defined rules based on user selection. The communication request may be blocked 308 based on a heuristic determination of user preferences. For instance, although additional reputation data is maintained in the database, only a portion of the maintained reputation data may be used in response to the search. For example, additional information is not retrieved based on user preferences, display capability or communication blocking profiles. - In other instances, the obtained reputation data is implemented for display, presented as an audible cue, and so on. The obtained reputation data may be forwarded to a user interface associated with the communication device. Presenting reputation data similarly may based on learned user preferences (such as a heuristic determination), or on user applied rules.
- Additionally, the procedure may include permitting 310 reputation feedback upon completion of a communication resulting from the communication request. For example, after a user has “viewed” a text message the user may be permitted to provide reputation feedback. In the case of a telephone call in which a source “leaves” a voice mail message a user may be permitted or perhaps, reminded via an audible message that he/she can provide reputation feedback. For example, the user may be prompted to “delete” the voice mail message and concurrently provide reputation feedback (e.g., a message stating “press 7 to delete and report as a financial solicitation”).
- Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claimed invention.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/692,865 US7895154B2 (en) | 2007-03-28 | 2007-03-28 | Communication reputation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/692,865 US7895154B2 (en) | 2007-03-28 | 2007-03-28 | Communication reputation |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080243920A1 true US20080243920A1 (en) | 2008-10-02 |
US7895154B2 US7895154B2 (en) | 2011-02-22 |
Family
ID=39796136
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/692,865 Expired - Fee Related US7895154B2 (en) | 2007-03-28 | 2007-03-28 | Communication reputation |
Country Status (1)
Country | Link |
---|---|
US (1) | US7895154B2 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080303689A1 (en) * | 2007-06-07 | 2008-12-11 | Microsoft Corporation | Accessible Content Reputation Lookup |
US20090132689A1 (en) * | 2007-11-15 | 2009-05-21 | Yahoo! Inc. | Trust based moderation |
US20100114744A1 (en) * | 2008-10-30 | 2010-05-06 | Metro Enterprises, Inc. | Reputation scoring and reporting system |
US20110283349A1 (en) * | 2009-03-12 | 2011-11-17 | Zte Corporation | Implement method and device of terminal call firewall |
US20120159580A1 (en) * | 2010-11-24 | 2012-06-21 | Galwas Paul Anthony | Method of Establishing Trusted Contacts With Access Rights In a Secure Communication System |
US8484730B1 (en) * | 2011-03-10 | 2013-07-09 | Symantec Corporation | Systems and methods for reporting online behavior |
US8849909B2 (en) | 2007-07-06 | 2014-09-30 | Yahoo! Inc. | Real-time asynchronous event aggregation systems |
US8862699B2 (en) | 2009-12-14 | 2014-10-14 | Microsoft Corporation | Reputation based redirection service |
US9167081B1 (en) | 2014-05-09 | 2015-10-20 | Lexisnexis Risk Solutions Inc. | Systems and methods for scoring phone numbers |
US9336379B2 (en) | 2010-08-19 | 2016-05-10 | Microsoft Technology Licensing, Llc | Reputation-based safe access user experience |
US9519682B1 (en) | 2011-05-26 | 2016-12-13 | Yahoo! Inc. | User trustworthiness |
CN107113360A (en) * | 2014-12-23 | 2017-08-29 | 英特尔公司 | Cooperate phone credit system |
US20200177552A1 (en) * | 2011-02-15 | 2020-06-04 | Webroot Inc. | Methods and apparatus for malware threat research |
US11627145B2 (en) * | 2014-09-24 | 2023-04-11 | Mcafee, Llc | Determining a reputation of data using a data visa including information indicating a reputation |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8750842B1 (en) | 2012-03-01 | 2014-06-10 | Amdocs Software Systems Limited | System, method, and computer program for filtering a request to communicate with a user |
US9729616B2 (en) * | 2014-07-18 | 2017-08-08 | Cisco Technology, Inc. | Reputation-based strategy for forwarding and responding to interests over a content centric network |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5379307A (en) * | 1991-07-05 | 1995-01-03 | Fujitsu Limited | System for detecting failure in dual bus user network |
US6198812B1 (en) * | 1998-09-23 | 2001-03-06 | Effectrol Patent Trust | Incoming telephone call filter utilizing a duplicitous caller-ID recognition method and apparatus |
US6353663B1 (en) * | 1999-12-06 | 2002-03-05 | Alcatel Usa Sourcing, Lp | Method and apparatus for screening telephone calls |
US20030072426A1 (en) * | 2001-09-26 | 2003-04-17 | Richard Davidson | Method for processing potentially unwanted calls |
US6748422B2 (en) * | 2000-10-19 | 2004-06-08 | Ebay Inc. | System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based commerce facility |
US6925162B1 (en) * | 1999-09-16 | 2005-08-02 | Mci, Inc. | Method and system for negotiated call forwarding |
US20050201363A1 (en) * | 2004-02-25 | 2005-09-15 | Rod Gilchrist | Method and apparatus for controlling unsolicited messaging in real time messaging networks |
US20050227678A1 (en) * | 2004-04-09 | 2005-10-13 | Anuraag Agrawal | Spam control for sharing content on mobile devices |
US20060015937A1 (en) * | 2004-06-08 | 2006-01-19 | Daniel Illowsky | System method and model for maintaining device integrity and security among intermittently connected interoperating devices |
US7068761B2 (en) * | 1999-03-02 | 2006-06-27 | Sbc Properties, L.P. | Method and system for canceling unwanted telephone calls |
US20060173741A1 (en) * | 2004-12-10 | 2006-08-03 | Marshal James C | Permission-based marketing method and system |
US7127050B2 (en) * | 2000-03-27 | 2006-10-24 | Sbc Propoerties, L.P. | Method and system for providing enhanced caller identification information |
US7136472B2 (en) * | 1999-08-12 | 2006-11-14 | Bellsouth Intellectual Property Corporation | System and method for privacy management |
US20060293057A1 (en) * | 2005-06-24 | 2006-12-28 | Mazerski Thomas M | System and method for secure web-based mobile phone parental controls |
US7562304B2 (en) * | 2005-05-03 | 2009-07-14 | Mcafee, Inc. | Indicating website reputations during website manipulation of user information |
-
2007
- 2007-03-28 US US11/692,865 patent/US7895154B2/en not_active Expired - Fee Related
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5379307A (en) * | 1991-07-05 | 1995-01-03 | Fujitsu Limited | System for detecting failure in dual bus user network |
US6198812B1 (en) * | 1998-09-23 | 2001-03-06 | Effectrol Patent Trust | Incoming telephone call filter utilizing a duplicitous caller-ID recognition method and apparatus |
US7068761B2 (en) * | 1999-03-02 | 2006-06-27 | Sbc Properties, L.P. | Method and system for canceling unwanted telephone calls |
US20060233320A1 (en) * | 1999-03-02 | 2006-10-19 | Latter Teresa F | Method and system for canceling unwanted calls |
US7136472B2 (en) * | 1999-08-12 | 2006-11-14 | Bellsouth Intellectual Property Corporation | System and method for privacy management |
US6925162B1 (en) * | 1999-09-16 | 2005-08-02 | Mci, Inc. | Method and system for negotiated call forwarding |
US6353663B1 (en) * | 1999-12-06 | 2002-03-05 | Alcatel Usa Sourcing, Lp | Method and apparatus for screening telephone calls |
US7127050B2 (en) * | 2000-03-27 | 2006-10-24 | Sbc Propoerties, L.P. | Method and system for providing enhanced caller identification information |
US6748422B2 (en) * | 2000-10-19 | 2004-06-08 | Ebay Inc. | System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based commerce facility |
US20030072426A1 (en) * | 2001-09-26 | 2003-04-17 | Richard Davidson | Method for processing potentially unwanted calls |
US20050201363A1 (en) * | 2004-02-25 | 2005-09-15 | Rod Gilchrist | Method and apparatus for controlling unsolicited messaging in real time messaging networks |
US20050227678A1 (en) * | 2004-04-09 | 2005-10-13 | Anuraag Agrawal | Spam control for sharing content on mobile devices |
US20060015937A1 (en) * | 2004-06-08 | 2006-01-19 | Daniel Illowsky | System method and model for maintaining device integrity and security among intermittently connected interoperating devices |
US20060173741A1 (en) * | 2004-12-10 | 2006-08-03 | Marshal James C | Permission-based marketing method and system |
US7562304B2 (en) * | 2005-05-03 | 2009-07-14 | Mcafee, Inc. | Indicating website reputations during website manipulation of user information |
US20060293057A1 (en) * | 2005-06-24 | 2006-12-28 | Mazerski Thomas M | System and method for secure web-based mobile phone parental controls |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7966553B2 (en) * | 2007-06-07 | 2011-06-21 | Microsoft Corporation | Accessible content reputation lookup |
US20110167328A1 (en) * | 2007-06-07 | 2011-07-07 | Microsoft Corporation | Accessible content reputation lookup |
US20080303689A1 (en) * | 2007-06-07 | 2008-12-11 | Microsoft Corporation | Accessible Content Reputation Lookup |
US9769194B2 (en) | 2007-06-07 | 2017-09-19 | Microsoft Technology Licensing, Llc | Accessible content reputation lookup |
US8849909B2 (en) | 2007-07-06 | 2014-09-30 | Yahoo! Inc. | Real-time asynchronous event aggregation systems |
US9576253B2 (en) | 2007-11-15 | 2017-02-21 | Yahoo! Inc. | Trust based moderation |
US20090132689A1 (en) * | 2007-11-15 | 2009-05-21 | Yahoo! Inc. | Trust based moderation |
US8171388B2 (en) * | 2007-11-15 | 2012-05-01 | Yahoo! Inc. | Trust based moderation |
US20100114744A1 (en) * | 2008-10-30 | 2010-05-06 | Metro Enterprises, Inc. | Reputation scoring and reporting system |
US8117106B2 (en) * | 2008-10-30 | 2012-02-14 | Telesign Corporation | Reputation scoring and reporting system |
US20110283349A1 (en) * | 2009-03-12 | 2011-11-17 | Zte Corporation | Implement method and device of terminal call firewall |
US8549608B2 (en) * | 2009-03-12 | 2013-10-01 | Zte Corporation | Implement method and device of terminal call firewall |
US8862699B2 (en) | 2009-12-14 | 2014-10-14 | Microsoft Corporation | Reputation based redirection service |
US9336379B2 (en) | 2010-08-19 | 2016-05-10 | Microsoft Technology Licensing, Llc | Reputation-based safe access user experience |
US20120159580A1 (en) * | 2010-11-24 | 2012-06-21 | Galwas Paul Anthony | Method of Establishing Trusted Contacts With Access Rights In a Secure Communication System |
US20200177552A1 (en) * | 2011-02-15 | 2020-06-04 | Webroot Inc. | Methods and apparatus for malware threat research |
US8484730B1 (en) * | 2011-03-10 | 2013-07-09 | Symantec Corporation | Systems and methods for reporting online behavior |
US9519682B1 (en) | 2011-05-26 | 2016-12-13 | Yahoo! Inc. | User trustworthiness |
US9380154B2 (en) | 2014-05-09 | 2016-06-28 | Lexisnexis Risk Solutions Inc. | Systems and methods for scoring phone numbers |
GB2540692A (en) * | 2014-05-09 | 2017-01-25 | Lexisnexis Risk Solutions Inc | Systems and methods for scoring phone numbers |
US9591130B2 (en) | 2014-05-09 | 2017-03-07 | Lexisnexis Risk Solutions Inc. | Systems and methods for scoring phone numbers |
WO2015171204A1 (en) * | 2014-05-09 | 2015-11-12 | Lexisnexis Risk Solutions Inc. | Systems and methods for scoring phone numbers |
US9167081B1 (en) | 2014-05-09 | 2015-10-20 | Lexisnexis Risk Solutions Inc. | Systems and methods for scoring phone numbers |
US11627145B2 (en) * | 2014-09-24 | 2023-04-11 | Mcafee, Llc | Determining a reputation of data using a data visa including information indicating a reputation |
US10044855B2 (en) | 2014-12-23 | 2018-08-07 | Intel Corporation | Collaborative phone reputation system |
JP2018038066A (en) * | 2014-12-23 | 2018-03-08 | インテル コーポレイション | Collaborative phone reputation system |
CN108696644A (en) * | 2014-12-23 | 2018-10-23 | 英特尔公司 | Cooperate phone credit system |
EP3291524A1 (en) * | 2014-12-23 | 2018-03-07 | Intel Corporation | Collaborative phone reputation system |
US10715659B2 (en) | 2014-12-23 | 2020-07-14 | Intel Corporation | Collaborative phone reputation system |
US11032417B2 (en) | 2014-12-23 | 2021-06-08 | Intel Corporation | Collaborative phone reputation system |
CN107113360A (en) * | 2014-12-23 | 2017-08-29 | 英特尔公司 | Cooperate phone credit system |
US11838443B2 (en) | 2014-12-23 | 2023-12-05 | Intel Corporation | Collaborative phone reputation system |
Also Published As
Publication number | Publication date |
---|---|
US7895154B2 (en) | 2011-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7895154B2 (en) | Communication reputation | |
US11316973B2 (en) | Methods and systems for inbound and outbound call control | |
US9819797B2 (en) | Methods and systems for inbound call control | |
US7487170B2 (en) | Location information for avoiding unwanted communications systems and methods | |
US7697942B2 (en) | Location based rules architecture systems and methods | |
US8935226B2 (en) | Location based access to financial information systems and methods | |
US9002814B2 (en) | Location based authorization of financial card transactions systems and methods | |
US8443049B1 (en) | Call processing using trust scores based on messaging patterns of message source | |
US8510319B2 (en) | Location based information for emergency services systems and methods | |
JP5351787B2 (en) | Communication processing system and program | |
EP2328334A1 (en) | Method and systems for real time display of caller location, profile, and trust relationship | |
JP2013005205A (en) | Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system | |
US10230837B2 (en) | Methods and systems for inbound and outbound call control | |
US7130405B2 (en) | Identifying a call made or received on behalf of another | |
US9002333B1 (en) | Mobile device reputation system | |
JP2005109610A (en) | Method and system for preventing nuisance call | |
US20090178117A1 (en) | System and method of retrieving a service contact identifier | |
JP6296159B2 (en) | Caller identification device, caller identification method, and recording medium for storing caller identification program | |
US11627218B2 (en) | Caller identification information analyzer | |
CN106888229B (en) | Call management method and server | |
US7409206B2 (en) | Defending against unwanted communications by striking back against the beneficiaries of the unwanted communications | |
JP6368666B2 (en) | Nuisance call countermeasure system and nuisance call countermeasure method | |
KR20090096111A (en) | Method and apparatus for processing spam | |
KR20180006775A (en) | Apparatus for providing caller information and user device | |
CN103200178A (en) | Method and device for inquiring and processing conversation party information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NEWMAN, BEN;DE OLIVEIRA, JOSE M;REEL/FRAME:019130/0443 Effective date: 20070327 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034542/0001 Effective date: 20141014 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552) Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230222 |